Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Broken Link Hijacking #84

Closed
EdOverflow opened this issue Sep 11, 2017 · 3 comments
Closed

Add Broken Link Hijacking #84

EdOverflow opened this issue Sep 11, 2017 · 3 comments
Labels

Comments

@EdOverflow
Copy link

Please refer to this technical write-up on "Broken Link Hijacking" (BLH): https://edoverflow.com/2017/broken-link-hijacking/

BLH can be broken down into two main categories: Stored and reflected.

The different (sub)categories can be classified as follows:

Impersonation

This one I am not too sure about, since it really depends on how convincing the attack is. If the link is the main installation button on the homepage it is going to cause more trouble than a little broken Facebook link on a company's "About" page.

External JS or SVG File Hijacking

This is essentially stored XSS. The attacker's malicious code is stored in the page. This should be rated the same as stored XSS:

image

Information Leakage

This would mainly fall under:

image

Content Hijacking

This category depends entirely on the content being served, but for the most part I imagine this would belong to:

image

Reflected

This is the same as reflected XSS.

image

@jhaddix
Copy link

jhaddix commented Sep 11, 2017

If the takeover can be proven, then yes I'd classify as the highest of these impacts (P2 - Stored XSS). Not sure if I'd create a standalone category though.

@plr0man
Copy link
Contributor

plr0man commented Sep 14, 2017

Thanks for the writeup @EdOverflow! I agree with @jhaddix, looks like the existing entries are sufficient to clearly classify every scenario you describe. Please let us know if you would like to propose any improvements though.

@plr0man plr0man closed this as completed Sep 18, 2017
@trimkadriu
Copy link

Can we re-open for discussion this issue? I feel like this is being overrated, specifically the impersonation part.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

No branches or pull requests

4 participants